Looking for the vulnerability index of Invicti's legacy products?
Openfire Admin Console Full Read SSRF - Vulnerability Database

Openfire Admin Console Full Read SSRF

Description

Openfire is a cross-platform, Java-based XMPP (Jabber) server developed by Ignite Realtime for enterprise instant messaging and collaboration.

Versions of Openfire prior to 4.4.3 contain a Server-Side Request Forgery (SSRF) vulnerability in the FaviconServlet component of the Admin Console. This vulnerability can be exploited by unauthenticated attackers to make the server send arbitrary HTTP GET requests to internal network resources and retrieve the responses, effectively using the Openfire server as a proxy to access systems that would otherwise be unreachable from the external network.

Remediation

Immediately upgrade Openfire to version 4.4.3 or later, which contains a fix for this vulnerability. Follow these steps:

1. Back up your current Openfire installation, including the database and configuration files
2. Download Openfire version 4.4.3 or newer from the official Ignite Realtime website
3. Follow the upgrade instructions provided in the Openfire documentation for your specific platform
4. After upgrading, verify the version number in the Admin Console to confirm the update was successful
5. Review server logs for any suspicious activity that may have occurred prior to patching

As an additional security measure, restrict network access to the Openfire Admin Console using firewall rules or access control lists to limit exposure to trusted IP addresses only. If immediate patching is not possible, consider temporarily disabling the Admin Console or placing it behind a VPN until the upgrade can be completed.